Red Hat Bugzilla – Bug 1316569
CVE-2016-3619 libtiff: bmp2tiff DumpModeEncode OOB read
Last modified: 2017-05-10 17:04:56 EDT
It was reported that an out-of-bounds memory read could be triggered by processing a specially crafted BMP file using the bmp2tiff tool. References: http://bugzilla.maptools.org/show_bug.cgi?id=2567
Acknowledgments: Name: Mei Wang (Qihoo 360)
Created attachment 1135189 [details] Crash report
Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 1324816]
Created mingw-libtiff tracking bugs for this issue: Affects: fedora-all [bug 1324817]
Public via: http://seclists.org/oss-sec/2016/q2/20
Statement: This issue did not affect the versions of libtiff as shipped with Red Hat Enterprise Linux 6 and 7. This issue did not affect the versions of compat-libtiff3 as shipped with Red Hat Enterprise Linux 7, as they did not include the bmp2tiff tool.